Skip to main Content

AWS Security Essentials

  • Code training GK3337
  • Duur 1 dag

Op locatie klant Prijs

op aanvraag

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Class Connect

    Verbind naar een klas in HD

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven
AWS Security Essentials covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.  This course enables you to dive deep, ask questions, work through solutions, and get feedback from AWS-accredited instructors with deep technical knowledge. This is a fundamental level course and is a part of the AWS Security learning path.

Doelgroep

Naar boven

This course is intended for:

- IT business-level professionals interested in cloud security practices

- Security professionals with minimal working knowledge of AWS

Trainingsdoelstellingen

Naar boven

This course is designed to teach you how to:

  • Identify security benefits and responsibilities when using the AWS Cloud
  • Describe the access control and management features of AWS 
  • Understand the different data encryption methods to secure sensitive data
  • Describe how to secure network access to your AWS resources 
  • Determine which AWS services can be used for security logging and monitoring

Inhoud training

Naar boven

Module 1: Exploring the Security Pillar

  • AWS Well-Architected Framework: Security Pillar

Module 2: Security of the Cloud

  • Shared responsibility model
  • AWS Global Infrastructure
  • Compliance and governance

Module 3: Identity and Access Management

  • Identity and access management
  • Data access and protection essentials
  • Lab 1: Introduction to Security Policies

Module 4: Protecting Infrastructure and Data

  • Protecting your network infrastructure
  • Edge Security
  • DDoS Mitigation
  • Protecting compute resources
  • Lab 2: Securing VPC Resources with Security Groups

Module 5: Detection and Response

  • Monitoring and detective controls
  • Incident response essentials

Module 6: Course Wrap-Up

  • Course review

Voorkennis

Naar boven

We recommend that attendees of this course have:

  • Working knowledge of IT security practices and infrastructure concepts, familiarity with cloud computing concepts
Cookie Control toggle icon